Identity and access management business performance through connected intelligence
This book provides a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. It provides reusable templates and source code examples in Java, XML, and SPML
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Syngress
2013
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 100813 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220025600.0 | ||
| 008 | 221104 20132014maua bi 000 0 eng d | ||
| 020 | |a 9780124081406 (pbk.) | ||
| 039 | 9 | |a 202211041126 |b VLOAD |c 201411191539 |d faezah |c 201411191538 |d faezah |c 201411191252 |d faezah |y 201410132039 |z syarifuddin | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a QA 76.9 .A25 |b O78 2013 | ||
| 100 | 1 | |a Osmanoglu, Ertem |e author | |
| 245 | 1 | 0 | |a Identity and access management |b business performance through connected intelligence |c Ertem Osmanoglu |
| 264 | 1 | |a Waltham, MA |b Syngress |c 2013 | |
| 264 | 4 | |c © 2014 | |
| 300 | |a xxix, 618 pages |b illustrations |c 24 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 504 | |a Includes bibliographical references and index | ||
| 505 | 0 | |a 1. Business requirements and business case development -- 2. IAM framework, key principles and definitions -- 3. Current state and capability maturity -- 4. Common challenges and key considerations -- 5. Case study : access reviews -- 6. Future state definition -- 7. IAM roadmap and strategy -- 8. Identity and access intelligence : a risk-based approach -- 9. Enabling business through cloud-based IAM -- 10. Case study : future state -- finding a way out of the labyrinth -- 11. Implementation methodology and approach -- 12. Access request, approval, and provisioning -- 13. nforcement -- 14. Access review and certification -- 15. Privileged access management -- 16. Roles and rules -- 17. IAM product selection -- 18. Case study : implementation -- 19. The future of identity and access management | |
| 520 | |a This book provides a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. It provides reusable templates and source code examples in Java, XML, and SPML | ||
| 592 | |a 00013726 |b 04/11/2014 |c RM 239.80 |h PVK | ||
| 650 | 0 | |a Computer security | |
| 650 | 0 | |a Computers |x access control | |
| 650 | 0 | |a Computer networks |x Security measures | |
| 650 | 0 | |a False personation |x Prevention | |
| 999 | |a vtls000052957 |c 100813 |d 100813 | ||


